100% found this document useful (6 votes)
80 views

Download ebooks file Data Structures and Algorithms with JavaScript 1st Edition Michael Mcmillan all chapters

The document provides links to various eBooks related to data structures and algorithms, including titles focused on JavaScript, C, Python, and more. It includes detailed descriptions of the content covered in the eBooks, such as programming environments, data structures, algorithms, and specific implementations. Additionally, it lists the authors and publication details for each title, along with instructions for downloading the eBooks in different formats.

Uploaded by

elichnebenb3
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (6 votes)
80 views

Download ebooks file Data Structures and Algorithms with JavaScript 1st Edition Michael Mcmillan all chapters

The document provides links to various eBooks related to data structures and algorithms, including titles focused on JavaScript, C, Python, and more. It includes detailed descriptions of the content covered in the eBooks, such as programming environments, data structures, algorithms, and specific implementations. Additionally, it lists the authors and publication details for each title, along with instructions for downloading the eBooks in different formats.

Uploaded by

elichnebenb3
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 41

Download the Full Version of the Ebook with Added Features ebookname.

com

Data Structures and Algorithms with JavaScript 1st


Edition Michael Mcmillan

https://ebookname.com/product/data-structures-and-
algorithms-with-javascript-1st-edition-michael-mcmillan/

OR CLICK HERE

DOWLOAD NOW

Download more ebook instantly today at https://ebookname.com


Instant digital products (PDF, ePub, MOBI) available
Download now and explore formats that suit you...

Data Structures and Algorithms in C 2nd Edition Michael T.


Goodrich

https://ebookname.com/product/data-structures-and-algorithms-in-c-2nd-
edition-michael-t-goodrich/

ebookname.com

Problem Solving with Algorithms and Data Structures Using


Python SECOND EDITION Bradley N. Miller

https://ebookname.com/product/problem-solving-with-algorithms-and-
data-structures-using-python-second-edition-bradley-n-miller/

ebookname.com

Clojure Data Structures and Algorithms Cookbook 25 recipes


to deeply understand and implement advanced algorithms in
Clojure 1st Edition Rafik Naccache
https://ebookname.com/product/clojure-data-structures-and-algorithms-
cookbook-25-recipes-to-deeply-understand-and-implement-advanced-
algorithms-in-clojure-1st-edition-rafik-naccache/
ebookname.com

David Griffiths and the Missionary History of Madagascar 1


Edition Gwyn Campbell

https://ebookname.com/product/david-griffiths-and-the-missionary-
history-of-madagascar-1-edition-gwyn-campbell/

ebookname.com
Discrete Time Branching Processes in Random Environment
1st Edition Götz Kersting

https://ebookname.com/product/discrete-time-branching-processes-in-
random-environment-1st-edition-gotz-kersting/

ebookname.com

A Playful Path Bernard De Koven

https://ebookname.com/product/a-playful-path-bernard-de-koven/

ebookname.com

Music in Words Trevor Herbert

https://ebookname.com/product/music-in-words-trevor-herbert/

ebookname.com

C Programming Program Design Including Data Structures


Fourth edition D. S. Malik

https://ebookname.com/product/c-programming-program-design-including-
data-structures-fourth-edition-d-s-malik/

ebookname.com

Water Infrastructure Issues 1st Edition James D. Haffner

https://ebookname.com/product/water-infrastructure-issues-1st-edition-
james-d-haffner/

ebookname.com
Equine Dermatology 1st Edition Danny W. Scott Dvm Dacvd

https://ebookname.com/product/equine-dermatology-1st-edition-danny-w-
scott-dvm-dacvd/

ebookname.com
www.it-ebooks.info
www.it-ebooks.info
Data Structures and Algorithms
with JavaScript

Michael McMillan

www.it-ebooks.info
Data Structures and Algorithms with JavaScript
by Michael McMillan
Copyright © 2014 Michael McMillan. All rights reserved.
Printed in the United States of America.
Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472.
O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are
also available for most titles (http://my.safaribooksonline.com). For more information, contact our corporate/
institutional sales department: 800-998-9938 or corporate@oreilly.com.
Editors: Brian MacDonald and Meghan Blanchette Cover Designer: Karen Montgomery
Production Editor: Melanie Yarbrough Interior Designer: David Futato
Copyeditor: Becca Freed Illustrators: Rebecca Demarest and Cynthia Clarke
Proofreader: Amanda Kersey Fehrenbach
Indexer: Ellen Troutman-Zaig

March 2014: First Edition

Revision History for the First Edition:


2014-03-06: First release

See http://oreilly.com/catalog/errata.csp?isbn=9781449364939 for release details.

Nutshell Handbook, the Nutshell Handbook logo, and the O’Reilly logo are registered trademarks of O’Reilly
Media, Inc. Data Structures and Algorithms with JavaScript, the image of an amur hedgehog, and related
trade dress are trademarks of O’Reilly Media, Inc.
Many of the designations used by manufacturers and sellers to distinguish their products are claimed as
trademarks. Where those designations appear in this book, and O’Reilly Media, Inc. was aware of a trademark
claim, the designations have been printed in caps or initial caps.
While every precaution has been taken in the preparation of this book, the publisher and authors assume
no responsibility for errors or omissions, or for damages resulting from the use of the information contained
herein.

ISBN: 978-1-449-36493-9
[LSI]

www.it-ebooks.info
Table of Contents

Preface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix

1. The JavaScript Programming Environment and Model. . . . . . . . . . . . . . . . . . . . . . . . . . . . 1


The JavaScript Environment 1
JavaScript Programming Practices 2
Declaring and Intializing Variables 3
Arithmetic and Math Library Functions in JavaScript 3
Decision Constructs 4
Repetition Constructs 6
Functions 7
Variable Scope 8
Recursion 10
Objects and Object-Oriented Programming 10
Summary 12

2. Arrays. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
JavaScript Arrays Defined 13
Using Arrays 13
Creating Arrays 14
Accessing and Writing Array Elements 15
Creating Arrays from Strings 15
Aggregate Array Operations 16
Accessor Functions 17
Searching for a Value 17
String Representations of Arrays 18
Creating New Arrays from Existing Arrays 18
Mutator Functions 19
Adding Elements to an Array 19
Removing Elements from an Array 20

iii

www.it-ebooks.info
Adding and Removing Elements from the Middle of an Array 21
Putting Array Elements in Order 22
Iterator Functions 23
Non–Array-Generating Iterator Functions 23
Iterator Functions That Return a New Array 25
Two-Dimensional and Multidimensional Arrays 27
Creating Two-Dimensional Arrays 27
Processing Two-Dimensional Array Elements 28
Jagged Arrays 30
Arrays of Objects 30
Arrays in Objects 31
Exercises 33

3. Lists. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
A List ADT 35
A List Class Implementation 36
Append: Adding an Element to a List 37
Remove: Removing an Element from a List 37
Find: Finding an Element in a List 38
Length: Determining the Number of Elements in a List 38
toString: Retrieving a List’s Elements 38
Insert: Inserting an Element into a List 39
Clear: Removing All Elements from a List 39
Contains: Determining if a Given Value Is in a List 40
Traversing a List 40
Iterating Through a List 41
A List-Based Application 42
Reading Text Files 42
Using Lists to Manage a Kiosk 43
Exercises 47

4. Stacks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Stack Operations 49
A Stack Implementation 50
Using the Stack Class 53
Multiple Base Conversions 53
Palindromes 54
Demonstrating Recursion 56
Exercises 57

5. Queues. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Queue Operations 59

iv | Table of Contents

www.it-ebooks.info
An Array-Based Queue Class Implementation 60
Using the Queue Class: Assigning Partners at a Square Dance 63
Sorting Data with Queues 67
Priority Queues 70
Exercises 72

6. Linked Lists. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Shortcomings of Arrays 73
Linked Lists Defined 74
An Object-Based Linked List Design 75
The Node Class 75
The Linked List Class 76
Inserting New Nodes 76
Removing Nodes from a Linked List 78
Doubly Linked Lists 81
Circularly Linked Lists 85
Other Linked List Functions 86
Exercises 86

7. Dictionaries. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
The Dictionary Class 89
Auxiliary Functions for the Dictionary Class 91
Adding Sorting to the Dictionary Class 93
Exercises 94

8. Hashing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
An Overview of Hashing 97
A Hash Table Class 98
Choosing a Hash Function 98
A Better Hash Function 101
Hashing Integer Keys 103
Storing and Retrieving Data in a Hash Table 106
Handling Collisions 107
Separate Chaining 107
Linear Probing 109
Exercises 111

9. Sets. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Fundamental Set Definitions, Operations, and Properties 113
Set Definitions 113
Set Operations 114
The Set Class Implementation 114

Table of Contents | v

www.it-ebooks.info
More Set Operations 116
Exercises 120

10. Binary Trees and Binary Search Trees. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121


Trees Defined 121
Binary Trees and Binary Search Trees 123
Building a Binary Search Tree Implementation 124
Traversing a Binary Search Tree 126
BST Searches 129
Searching for the Minimum and Maximum Value 130
Searching for a Specific Value 131
Removing Nodes from a BST 132
Counting Occurrences 134
Exercises 137

11. Graphs and Graph Algorithms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139


Graph Definitions 139
Real-World Systems Modeled by Graphs 141
The Graph Class 141
Representing Vertices 141
Representing Edges 142
Building a Graph 143
Searching a Graph 145
Depth-First Search 145
Breadth-First Search 148
Finding the Shortest Path 149
Breadth-First Search Leads to Shortest Paths 149
Determining Paths 150
Topological Sorting 151
An Algorithm for Topological Sorting 152
Implementing the Topological Sorting Algorithm 152
Exercises 157

12. Sorting Algorithms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159


An Array Test Bed 159
Generating Random Data 161
Basic Sorting Algorithms 161
Bubble Sort 162
Selection Sort 165
Insertion Sort 167
Timing Comparisons of the Basic Sorting Algorithms 168
Advanced Sorting Algorithms 170

vi | Table of Contents

www.it-ebooks.info
The Shellsort Algorithm 171
The Mergesort Algorithm 176
The Quicksort Algorithm 181
Exercises 186

13. Searching Algorithms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187


Sequential Search 187
Searching for Minimum and Maximum Values 190
Using Self-Organizing Data 193
Binary Search 196
Counting Occurrences 200
Searching Textual Data 202
Exercises 205

14. Advanced Algorithms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207


Dynamic Programming 207
A Dynamic Programming Example: Computing Fibonacci Numbers 208
Finding the Longest Common Substring 211
The Knapsack Problem: A Recursive Solution 214
The Knapsack Problem: A Dynamic Programming Solution 215
Greedy Algorithms 217
A First Greedy Algorithm Example: The Coin-Changing Problem 217
A Greedy Algorithm Solution to the Knapsack Problem 218
Exercises 220

Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221

Table of Contents | vii

www.it-ebooks.info
www.it-ebooks.info
Preface

Over the past few years, JavaScript has been used more and more as a server-side com‐
puter programming language owing to platforms such as Node.js and SpiderMonkey.
Now that JavaScript programming is moving out of the browser, programmers will find
they need to use many of the tools provided by more conventional languages, such as
C++ and Java. Among these tools are classic data structures such as linked lists, stacks,
queues, and graphs, as well as classic algorithms for sorting and searching data. This
book discusses how to implement these data structures and algorithms for server-side
JavaScript programming.
JavaScript programmers will find this book useful because it discusses how to implement
data structures and algorithms within the constraints that JavaScript places them, such
as arrays that are really objects, overly global variables, and a prototype-based object
system. JavaScript has an unfair reputation as a “bad” programming language, but this
book demonstrates how you can use JavaScript to develop efficient and effective data
structures and algorithms using the language’s “good parts.”

Why Study Data Structures and Algorithms


I am assuming that many of you reading this book do not have a formal education in
computer science. If you do, then you already know why studying data structures and
algorithms is important. If you do not have a degree in computer science or haven’t
studied these topics formally, you should read this section.
The computer scientist Nicklaus Wirth wrote a computer programming textbook titled
Algorithms + Data Structures = Programs (Prentice-Hall). That title is the essence of
computer programming. Any computer program that goes beyond the trivial “Hello,
world!” will usually require some type of structure to manage the data the program is
written to manipulate, along with one or more algorithms for translating the data from
its input form to its output form.

ix

www.it-ebooks.info
For many programmers who didn’t study computer science in school, the only data
structure they are familiar with is the array. Arrays are great for some problems, but for
many complex problems, they are simply not sophisticated enough. Most experienced
programmers will admit that for many programming problems, once they come up with
the proper data structure, the algorithms needed to solve the problem are easier to design
and implement.
An example of a data structure that leads to efficient algorithms is the binary search tree
(BST). A binary search tree is designed so that it is easy to find the minimum and
maximum values of a set of data, yielding an algorithm that is more efficient than the
best search algorithms available. Programmers unfamiliar with BSTs will instead prob‐
ably use a simpler data structure that ends up being less efficient.
Studying algorithms is important because there is always more than one algorithm that
can be used to solve a problem, and knowing which ones are the most efficient is im‐
portant for the productive programmer. For example, there are at least six or seven ways
to sort a list of data, but knowing that the Quicksort algorithm is more efficient than
the selection sort algorithm will lead to a much more efficient sorting process. Or that
it’s fairly easy to implement a sequential or linear search algorithm for a list of data, but
knowing that the binary sort algorithm can sometimes be twice as efficient as the se‐
quential search will lead to a better program.
The comprehensive study of data structures and algorithms teaches you not only which
data structures and which algorithms are the most efficient, but you also learn how to
decide which data structures and which algorithms are the most appropriate for the
problem at hand. There will often be trade-offs involved when writing a program, es‐
pecially in the JavaScript environment, and knowing the ins and outs of the various data
structures and algorithms covered in this book will help you make the proper decision
for any particular programming problem you are trying to solve.

What You Need for This Book


The programming environment we use in this book is the JavaScript shell based on
the SpiderMonkey JavaScript engine. Chapter 1 provides instructions on downloading
the shell for your environment. Other shells will work as well, such as the Node.js Java‐
Script shell, though you will have to make some translations for the programs in the
book to work in Node. Other than the shell, the only thing you need is a text editor for
writing your JavaScript programs.

x | Preface

www.it-ebooks.info
Organization of the Book
• Chapter 1 presents an overview of the JavaScript language, or at least the features
of the JavaScript language used in this book. This chapter also demonstrates through
use the programming style used throughout the other chapters.
• Chapter 2 discusses the most common data structure in computer programming:
the array, which is native to JavaScript.
• Chapter 3 introduces the first implemented data structure: the list.
• Chapter 4 covers the stack data structure. Stacks are used throughout computer
science in both compiler and operating system implementations.
• Chapter 5 discusses queue data structures. Queues are an abstraction of the lines
you stand in at a bank or the grocery store. Queues are used extensively in simulation
software where data has to be lined up before it is processed.
• Chapter 6 covers Linked lists. A linked list is a modification of the list data structure,
where each element is a separate object linked to the objects on either side of it.
Linked lists are efficient when you need to perform multiple insertions and dele‐
tions in your program.
• Chapter 7 demonstrates how to build and use dictionaries, which are data structures
that store data as key-value pairs.
• One way to implement a dictionary is to use a hash table, and Chapter 8 discusses
how to build hash tables and the hash algorithms that are used to store data in the
table.
• Chapter 9 covers the set data structure. Sets are often not covered in data structure
books, but they can be useful for storing data that is not supposed to have duplicates
in the data set.
• Binary trees and binary search trees are the subject of Chapter 10. As mentioned
earlier, binary search trees are useful for storing data that needs to be stored orig‐
inally in sorted form.
• Chapter 11 covers graphs and graph algorithms. Graphs are used to represent data
such as the nodes of a computer network or the cities on a map.
• Chapter 12 moves from data structures to algorithms and discusses various algo‐
rithms for sorting data, including both simple sorting algorithms that are easy to
implement but are not efficient for large data sets, and more complex algorithms
that are appropriate for larger data sets.
• Chapter 13 also covers algorithms, this time searching algorithms such as sequential
search and binary search.
• The last chapter of the book, Chapter 14, discusses a couple more advanced algo‐
rithms for working with data—dynamic programming and greedy algorithms.

Preface | xi

www.it-ebooks.info
These algorithms are useful for solving hard problems where a more traditional
algorithm is either too slow or too hard to implement. We examine some classic
problems for both dynamic programming and greedy algorithms in the chapter.

Conventions Used in This Book


The following typographical conventions are used in this book:
Italic
Indicates new terms, URLs, email addresses, filenames, and file extensions.
Constant width
Used for program listings, as well as within paragraphs to refer to program elements
such as variable or function names, databases, data types, environment variables,
statements, and keywords.
Constant width bold
Shows commands or other text that should be typed literally by the user.
Constant width italic
Shows text that should be replaced with user-supplied values or by values deter‐
mined by context.

Using Code Examples


Supplemental material (code examples, exercises, etc.) is available for download at
https://github.com/oreillymedia/data_structures_and_algorithms_using_javascript.
This book is here to help you get your job done. In general, if example code is offered
with this book, you may use it in your programs and documentation. You do not need
to contact us for permission unless you’re reproducing a significant portion of the code.
For example, writing a program that uses several chunks of code from this book does
not require permission. Selling or distributing a CD-ROM of examples from O’Reilly
books does require permission. Answering a question by citing this book and quoting
example code does not require permission. Incorporating a significant amount of ex‐
ample code from this book into your product’s documentation does require permission.
We appreciate, but do not require, attribution. An attribution usually includes the title,
author, publisher, and ISBN. For example: “Data Structures and Algorithms Using Java‐
Script by Michael McMillian (O’Reilly). Copyright 2014 Michael McMillan,
978-1-449-36493-9.”
If you feel your use of code examples falls outside fair use or the permission given above,
feel free to contact us at permissions@oreilly.com.

xii | Preface

www.it-ebooks.info
Safari® Books Online
Safari Books Online is an on-demand digital library that
delivers expert content in both book and video form from
the world’s leading authors in technology and business.
Technology professionals, software developers, web designers, and business and crea‐
tive professionals use Safari Books Online as their primary resource for research, prob‐
lem solving, learning, and certification training.
Safari Books Online offers a range of product mixes and pricing programs for organi‐
zations, government agencies, and individuals. Subscribers have access to thousands of
books, training videos, and prepublication manuscripts in one fully searchable database
from publishers like O’Reilly Media, Prentice Hall Professional, Addison-Wesley Pro‐
fessional, Microsoft Press, Sams, Que, Peachpit Press, Focal Press, Cisco Press, John
Wiley & Sons, Syngress, Morgan Kaufmann, IBM Redbooks, Packt, Adobe Press, FT
Press, Apress, Manning, New Riders, McGraw-Hill, Jones & Bartlett, Course Technol‐
ogy, and dozens more. For more information about Safari Books Online, please visit us
online.

How to Contact Us
Please address comments and questions concerning this book to the publisher:

O’Reilly Media, Inc.


1005 Gravenstein Highway North
Sebastopol, CA 95472
800-998-9938 (in the United States or Canada)
707-829-0515 (international or local)
707-829-0104 (fax)

We have a web page for this book, where we list errata, examples, and any additional
information. You can access this page at http://oreil.ly/data_structures_algorithms_JS.
To comment or ask technical questions about this book, send email to bookques
tions@oreilly.com.
For more information about our books, courses, conferences, and news, see our website
at http://www.oreilly.com.
Find us on Facebook: http://facebook.com/oreilly
Follow us on Twitter: http://twitter.com/oreillymedia
Watch us on YouTube: http://www.youtube.com/oreillymedia

Preface | xiii

www.it-ebooks.info
Random documents with unrelated
content Scribd suggests to you:
while the squaws and papooses were crossing the river, riding, or
swimming beside their swimming ponies.
The rear guard had at first run toward the front, but the front guard met
them halfway, and together they charged after the Indians. When near at
hand, Charles Elston was sent forward to offer those who would accept it
and come forward peacefully, immunity from punishment. They met his
offer with a shriek of defiance and charged furiously.
The Indians numbered more than five hundred warriors, and, when at a
distance of about three hundred yards, they commenced firing, and it was
answered in telling effect by the military. While those in front were checked
by the fire of the Gallagher rifles, both flanks of the Indians advanced as if
to hem them in and cut them off.
Over the hills from the west side of Horse Creek poured dozens and
hundreds of the shrieking demons, and an orderly retreat was taken to the
wagons, which, in the meantime, had been drawn up in a defensive circle,
and hastily constructed rifle pits made.
The Indians then ceased their firing and withdrew. Seeing that they were
indisposed to press their attack while the soldiers were behind defenses, and
wishing to keep them engaged and at hand until reënforcements came, the
officers in charge took fifty of the best mounted men and sallied out.
When out about three miles they saw a large force of Indians coming
around the hills on the west side of Horse Creek with the evident intention
of cutting them off. Again the military retired to their intrenchments.
About nine o’clock Captain Shuman arrived with a force from Camp
Shuman or Fort Mitchell, and, thus reënforced, another attack was made
upon the Indians, but it was a little late. The squaws and papooses had all
succeeded in crossing the river, and the warriors had followed.
The military could not follow, for it would be impractical, and perhaps
impossible to cross the river at its high stage, in the face of a superior
number of Indians.
A message had been sent to Fort Laramie, and Colonel Moonlight, well
known for his recent summary execution of three renegade Indians, had
started from the fort with two hundred and forty well-mounted men, when
he met another courier with the information that the Indians had crossed the
river, whereupon he crossed at the fort and took up the pursuit.
This constitutes another story, and the finish of the battle of Horse
Creek, the dead being the four named in the beginning of this article, and
four others were wounded. The dead were taken to Camp Shuman, the ruins
of which are still distinguishable, about three hundred feet south of the west
end of the Platte River Bridge, west of this city. And out southwest thereof
about a quarter of a mile they were laid to rest, and there have rested for this
half a century ending the middle of June. And now, from their obliterated
graves, they will be removed to join their fellows, the other early guardians
of the great Overland Trail, in the cemetery set aside for their honor by the
national government.

Finds War Signs on Wheat and Oat Leaves.


The report in some papers that the letter W appears on wheat leaves this
year and the letter B on oat leaves has set some of the farmers in the
vicinity of Charlotte, Mich., to investigating. The result is that oat leaves
have been found on which the letter B does seem to be quite visible, but the
wheat leaves are too ripe and shriveled by rust to give an exhibit of the
letter W.
It is claimed by some of the older residents that these letters appeared on
the wheat and oat leaves in 1860, the year before the breaking out of the
great Civil War, and they believe they indicate now a “bloody war,” in
which the United States will be engaged.
These letters, it is averred, have never appeared preceding a small war,
such as the Spanish-American War.
Another interpretation of these letters has been advanced to the effect
they indicate that Wilson and Bryan will be contestants for the nomination
for president in 1916.

This Dog is a Fire Fan.


Assistant Fire Chief Tom Davis, of Sharon, Pa., is the owner of an
English bulldog whose sole diversion is running to fires. The faithful
animal, now nine years old, has been absent from one alarm during his
career, a record probably not equaled by any fireman in the country. The
one absent mark credited against him was when he was out of the city.
The dog’s name is Peter. Chief Davis obtained him when a puppy. The
animal began following his master to fires, and when he was a year old he
became such a fire fiend that he didn’t even bother to wait for his owner. In
the days of the horse-drawn apparatus Pete was always first at the fires. His
love of the smoke and flames keeps him in the midst of the blaze while it
lasts. Pete is now afflicted with troubles incident to old age. When not
answering an alarm, he excites the pity of everybody by the manner in
which he painfully moves about. But let the fire bell sound, and the dog is
off in a flash, distancing any dog that tries to keep after him.
And if an alarm should be sounded at night, Pete goes to the fire just the
same. His owner runs a hotel, but sleep becomes impossible until Pete is
released from the building. Chief Davis has on several occasions given
orders that the dog is to be kept in the hotel when the bell rings. Docile as a
lamb on every other occasion, Pete shows great anger when an effort is
made to keep him away from a fire call. If perchance the hotel doors are
closed, the visitor who allows Pete to get outside has made himself forever
“solid” with the faithful animal. One time when penned in alone, Pete made
his way from the building by going through a closed window.
Pete’s principal duty in the days of horse-drawn apparatus was to protect
the horses from annoyance by strange dogs. And he always performed the
duty faithfully. During the last few years of the horse apparatus the dog
population seemed to know Pete’s duty, and it was only the puppy who
wanted to bark at the horses’ heads. The older canines knew better. They
had learned by experience that Pete meant business when he started for a
dog that happened to be annoying the horses.
The advent of the motor machinery was mourned by no one more than
Pete. He was unable to lead the machinery because it traveled so much
faster than the horses. Several narrow escapes have taught him to remain on
one side of the street. On two occasions the fire truck has felt the tear of the
emergency brakes to keep from running down the dog, for he is as dear to
the firemen as though he was their own. Age is telling on the animal, and he
generally returns from an alarm riding on the machine. He remains at the
department until the machinery is cleaned up and ready for another alarm,
and then he makes his way painfully to his home.
Some years ago the fire bell began ringing at seven a. m. and seven p. m.
Pete was fooled a few times, but he soon got wise. The same is true of the
curfew bell. To prove the almost human intelligence of the animal, an alarm
was sounded one night at nine o’clock. Pete never moved from his favorite
chair in the hotel until the bell had tapped more than nine strokes. Then he
was off like a flash. On this particular occasion pedestrians who have
learned to make a clear path when Pete comes along thought he was on his
way to the fire. Pete sent one young man sprawling on the ground by diving
between his legs and he frightened a woman half to death by a leap over her
baby carriage which barred his path.
A hitch in the ringing of the bell may send the human fire fiends
scurrying in the wrong direction. Not so with Pete. He seems to have a sixth
sense, and he gets to the scene by the shortest way possible, many times
taking an altogether different course from that of the firemen.
On one particular occasion the firemen were called to Sharpsville, four
miles away. No alarm was sounded, and Chief Davis was not aroused,
because he is a volunteer and the fire happened at midnight. But Pete
sensed that something was wrong. He began barking, and finally jerked the
covers from his owner’s bed. Davis was at a loss to account for the
excitement. Pete kept getting more boisterous and refused to be quieted.
Davis pulled on his clothes to let the animal outside. Opening a door, he
met a policeman who spoke of the fire. Davis went to the scene in his
automobile, and Pete was soon left behind. But the dog wasn’t lost. He
arrived at the fire as the firemen were prepared to return home. The faithful
animal was so weak from his run that he had to be lifted to the truck to be
carried home.
Sharon firemen answer an average of seventy-five alarms of fire a year,
therefore Chief Davis and all the firemen agree that Pete is entitled to credit
for his record. Council has taken recognition of the animal, and he is
possibly the only dog in the United States who is exonerated from wearing
a license tag.

Motor Trucks Used on Mail Routes.


Motor trucks are fast taking the place of wagon stages on the inland mail
lines in the sparsely settled districts of the Northwest where there are
villages still distant fifty, seventy-five, and even one hundred miles from the
railroad. The drivers of the trucks in making their trips over the lonely
prairies—miles from towns—have a variety of experiences, as does also
Uncle Sam’s mail.
Sixteen pouches of mail, including several sacks of women’s hats, lay
out on the prairie during the night following the burning of the truck that
carries the mail between Williston, N. D., and Watford, a distance of forty-
five miles.
It was past midnight, the car was ten miles out of Watford, and the mail
ten hours overdue, when, in cranking up, the engine fired back and the car
caught fire. The mail was barely saved.
The driver walked in ten miles, carrying the locked pouch of registered
mail and leaving the rest on the prairie for the night.

This Lake is Abode of Evil Spirits.


The most singular body of water in the United States is that of a small
lake in the western portion of the State of Washington, known by the
Chinook Indians as “Nao Skookum”—meaning “no good.” To the
inhabitants of the Indian villages this lake is a great mystery as well as a
source of great fear, for they believe the underground crevices that feed the
lake are full of “evil spirits.”
The lake covers perhaps fifty acres of ground, and fish and waterfowl are
more than plentiful—for about nine months of the year. North of the lake
towers Mount Olympus, of the Olympic range, while to the south and west
are the coast range of great hills.
In western Washington the “rainy season” usually lasts something like
nine months, and a week or so after the rain sets in, “Nao Skookum” Lake
grows very much in circumference and in depth, but, after a week’s dry
weather, its waters vanish, taking with them the fish and, so the Chinooks
declare, the waterfowl, too. When the rain stops, all the Indians in the
neighborhood gather on the shore of the lake in order to get as much fish as
possible while there is yet time.
Hour after hour the waters sink lower and lower, until the last of it drains
down the great holes and crevices at the bottom of the lake. Underground
openings of immeasurable length, and as yet untraced by human eye, take
the water from the lake, till what was once the bottom of a deep body of
water is open to the sky. Then and there the superstitious Indians desert the
vicinity of the lake, nor will they again go near it until the rain again comes
and the waters return with a rush and fill almost to overflowing what
scientists claim was once the crater of a volcano. When it is empty, the
Indians declare that thunderous roars and groans issue from the great
crevices in the lake’s bottom, and they will not venture near it, for “it is the
voice of the evil spirits,” they declare.
They again return to fish when the rain sets in and the waters surge
quickly up the subterranean openings, throwing up fish and great waves and
—so the ignorant Indians claim—the waterfowl. In from thirty to forty
hours, where had been a great bed of mud, all is deep water, and the lake of
Nao Skookum is again sparkling in the sunlight.
Scientists explain this most singular occurrence by stating that the lake is
connected by means of its underground openings with great bodies of water,
some on a higher level, under the great, snow-capped peaks of the mountain
ranges near by, others on a lower level than itself, and that the ducks and
other waterfowl come and go from the Pacific and Puget Sound. But no one
can convince a Chinook of anything but that they are thrown up with the
fish and the rushing waters.

American Munitions Small Potatoes.


“In my judgment, less than one million charges of artillery ammunition
has been sent from this country to all the belligerents in Europe since the
war broke out. This would not run any single army in Europe through a two
days’ battle in which one thousand guns were used.”
This statement was made here by one of the best ordnance experts in the
United States. He had before him the official figures of the department of
commerce on exports of cartridges, gunpowder, and high explosives
covering the eleven months of commerce up to June 1st. He declared that,
in his opinion, not all of this ammunition has yet reached the front in
Europe, for the reason that the belligerents themselves have been making
their own supply and gathering a reserve wherever they could find it,
instead of sending ammunition manufactured outside of their own country
directly to the front. The reason for this is that artillery ammunition is not
assembled when shipped, and has to be loaded and adjusted on arrival
abroad, before it can be sent to the front.
Officials in Washington do not hesitate to say that much of the
controversy over the question of shipments of war munitions to Europe
comes from newspaper publications of large orders for arms and
ammunition which are being placed in this country for future delivery. In
many cases it is necessary for the American manufacturers to erect a brand-
new plant to produce the goods, and in practically all such instances
delivery is months, if not a year, away.

The Nick Carter Stories


ISSUED EVERY SATURDAY BEAUTIFUL COLORED COVERS
When it comes to detective stories worth while, the Nick Carter Stories
contain the only ones that should be considered. They are not overdrawn
tales of bloodshed. They rather show the working of one of the finest minds
ever conceived by a writer. The name of Nick Carter is familiar all over the
world, for the stories of his adventures may be read in twenty languages. No
other stories have withstood the severe test of time so well as those
contained in the Nick Carter Stories. It proves conclusively that they are
the best. We give herewith a list of some of the back numbers in print. You
can have your news dealer order them, or they will be sent direct by the
publishers to any address upon receipt of the price in money or postage
stamps.
730—The Torn Card.
731—Under Desperation’s Spur.
732—The Connecting Link.
733—The Abduction Syndicate.
738—A Plot Within a Plot.
739—The Dead Accomplice.
746—The Secret Entrance.
747—The Cavern Mystery.
748—The Disappearing Fortune.
749—A Voice from the Past.
752—The Spider’s Web.
753—The Man With a Crutch.
754—The Rajah’s Regalia.
755—Saved from Death.
756—The Man Inside.
757—Out for Vengeance.
758—The Poisons of Exill.
759—The Antique Vial.
760—The House of Slumber.
761—A Double Identity.
762—“The Mocker’s” Stratagem.
763—The Man that Came Back.
764—The Tracks in the Snow.
765—The Babbington Case.
766—The Masters of Millions.
767—The Blue Stain.
768—The Lost Clew.
770—The Turn of a Card.
771—A Message in the Dust.
772—A Royal Flush.
774—The Great Buddha Beryl.
775—The Vanishing Heiress.
776—The Unfinished Letter.
777—A Difficult Trail.
782—A Woman’s Stratagem.
783—The Cliff Castle Affair.
784—A Prisoner of the Tomb.
785—A Resourceful Foe.
789—The Great Hotel Tragedies.
795—Zanoni, the Transfigured.
796—The Lure of Gold.
797—The Man With a Chest.
798—A Shadowed Life.
799—The Secret Agent.
800—A Plot for a Crown.
801—The Red Button.
802—Up Against It.
803—The Gold Certificate.
804—Jack Wise’s Hurry Call.
805—Nick Carter’s Ocean Chase.
807—Nick Carter’s Advertisement.
808—The Kregoff Necklace.
811—Nick Carter and the Nihilists.
812—Nick Carter and the Convict Gang.
813—Nick Carter and the Guilty Governor.
814—The Triangled Coin.
815—Ninety-nine—and One.
816—Coin Number 77.
NEW SERIES
NICK CARTER STORIES
1—The Man from Nowhere.
2—The Face at the Window.
3—A Fight for a Million.
4—Nick Carter’s Land Office.
5—Nick Carter and the Professor.
6—Nick Carter as a Mill Hand.
7—A Single Clew.
8—The Emerald Snake.
9—The Currie Outfit.
10—Nick Carter and the Kidnapped Heiress.
11—Nick Carter Strikes Oil.
12—Nick Carter’s Hunt for a Treasure.
13—A Mystery of the Highway.
14—The Silent Passenger.
15—Jack Dreen’s Secret.
16—Nick Carter’s Pipe Line Case.
17—Nick Carter and the Gold Thieves.
18—Nick Carter’s Auto Chase.
19—The Corrigan Inheritance.
20—The Keen Eye of Denton.
21—The Spider’s Parlor.
22—Nick Carter’s Quick Guess.
23—Nick Carter and the Murderess.
24—Nick Carter and the Pay Car.
25—The Stolen Antique.
26—The Crook League.
27—An English Cracksman.
28—Nick Carter’s Still Hunt.
29—Nick Carter’s Electric Shock.
30—Nick Carter and the Stolen Duchess.
31—The Purple Spot.
32—The Stolen Groom.
33—The Inverted Cross.
34—Nick Carter and Keno McCall.
35—Nick Carter’s Death Trap.
36—Nick Carter’s Siamese Puzzle.
37—The Man Outside.
38—The Death Chamber.
39—The Wind and the Wire.
40—Nick Carter’s Three Cornered Chase.
41—Dazaar, the Arch-Fiend.
42—The Queen of the Seven.
43—Crossed Wires.
44—A Crimson Clew.
45—The Third Man.
46—The Sign of the Dagger.
47—The Devil Worshipers.
48—The Cross of Daggers.
49—At Risk of Life.
50—The Deeper Game.
51—The Code Message.
52—The Last of the Seven.
53—Ten-Ichi, the Wonderful.
54—The Secret Order of Associated Crooks.
55—The Golden Hair Clew.
56—Back From the Dead.
57—Through Dark Ways.
58—When Aces Were Trumps.
59—The Gambler’s Last Hand.
60—The Murder at Linden Fells.
61—A Game for Millions.
62—Under Cover.
63—The Last Call.
64—Mercedes Danton’s Double.
65—The Millionaire’s Nemesis.
66—A Princess of the Underworld.
67—The Crook’s Blind.
68—The Fatal Hour.
69—Blood Money.
70—A Queen of Her Kind.
71—Isabel Benton’s Trump Card.
72—A Princess of Hades.
73—A Prince of Plotters.
74—The Crook’s Double.
75—For Life and Honor.
76—A Compact With Dazaar.
77—In the Shadow of Dazaar.
78—The Crime of a Money King.
79—Birds of Prey.
80—The Unknown Dead.
81—The Severed Hand.
82—The Terrible Game of Millions.
83—A Dead Man’s Power.
84—The Secrets of an Old House.
85—The Wolf Within.
86—The Yellow Coupon.
87—In the Toils.
88—The Stolen Radium.
89—A Crime in Paradise.
90—Behind Prison Bars.
91—The Blind Man’s Daughter.
92—On the Brink of Ruin.
93—Letter of Fire.
94—The $100,000 Kiss.
95—Outlaws of the Militia.
96—The Opium-Runners.
97—In Record Time.
98—The Wag-Nuk Clew.
99—The Middle Link.
100—The Crystal Maze.
101—A New Serpent in Eden.
102—The Auburn Sensation.
103—A Dying Chance.
104—The Gargoni Girdle.
105—Twice in Jeopardy.
106—The Ghost Launch.
107—Up in the Air.
108—The Girl Prisoner.
109—The Red Plague.
110—The Arson Trust.
111—The King of the Firebugs.
112—“Lifter’s” of the Lofts.
113—French Jimmie and His Forty Thieves.
114—The Death Plot.
115—The Evil Formula.
116—The Blue Button.
117—The Deadly Parallel.
118—The Vivisectionists.
119—The Stolen Brain.
120—An Uncanny Revenge.
121—The Call of Death.
122—The Suicide.
123—Half a Million Ransom.
124—The Girl Kidnapper.
125—The Pirate Yacht.
126—The Crime of the White Hand.
127—Found in the Jungle.
128—Six Men in a Loop.
129—The Jewels of Wat Chang.
130—The Crime in the Tower.
131—The Fatal Message.
132—Broken Bars.
133—Won by Magic.
134—The Secret of Shangore.
135—Straight to the Goal.
136—The Man They Held Back.
137—The Seal of Gijon.
138—The Traitors of the Tropics.
139—The Pressing Peril.
140—The Melting-Pot.
141—The Duplicate Night.
142—The Edge of a Crime.
143—The Sultan’s Pearls.
144—The Clew of the White Collar.
145—An Unsolved Mystery.
146—Paying the Price.
147—On Death’s Trail.
148—The Mark of Cain.
Dated July 17th, 1915.
149—A Network of Crime.
Dated July 24th, 1915.
150—The House of Fear.
Dated July 31st, 1915.
151—The Mystery of the Crossed Needles.
Dated August 7th, 1915.
152—The Forced Crime.
Dated August 14th, 1915.
153—The Doom of Sang Tu.
Dated August 21st, 1915.
154—The Mask of Death.
Dated August 28th, 1915.
155—The Gordon Elopement.
Dated Sept. 4th, 1915.
156—Blood Will Tell.

PRICE, FIVE CENTS PER COPY. If you want any back numbers of our
weeklies and cannot procure them from your news dealer, they can be
obtained direct from this office. Postage stamps taken the same as money.

STREET & SMITH, Publishers, 79-89 Seventh Ave., NEW YORK CITY
*** END OF THE PROJECT GUTENBERG EBOOK NICK CARTER
STORIES NO. 159, SEPTEMBER 25, 1915: DRIVEN FROM
COVER; OR, NICK CARTER'S DOUBLE RUSE ***

Updated editions will replace the previous one—the old editions will
be renamed.

Creating the works from print editions not protected by U.S.


copyright law means that no one owns a United States copyright in
these works, so the Foundation (and you!) can copy and distribute it
in the United States without permission and without paying copyright
royalties. Special rules, set forth in the General Terms of Use part of
this license, apply to copying and distributing Project Gutenberg™
electronic works to protect the PROJECT GUTENBERG™ concept
and trademark. Project Gutenberg is a registered trademark, and
may not be used if you charge for an eBook, except by following the
terms of the trademark license, including paying royalties for use of
the Project Gutenberg trademark. If you do not charge anything for
copies of this eBook, complying with the trademark license is very
easy. You may use this eBook for nearly any purpose such as
creation of derivative works, reports, performances and research.
Project Gutenberg eBooks may be modified and printed and given
away—you may do practically ANYTHING in the United States with
eBooks not protected by U.S. copyright law. Redistribution is subject
to the trademark license, especially commercial redistribution.

START: FULL LICENSE


THE FULL PROJECT GUTENBERG LICENSE
PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK

To protect the Project Gutenberg™ mission of promoting the free


distribution of electronic works, by using or distributing this work (or
any other work associated in any way with the phrase “Project
Gutenberg”), you agree to comply with all the terms of the Full
Project Gutenberg™ License available with this file or online at
www.gutenberg.org/license.

Section 1. General Terms of Use and


Redistributing Project Gutenberg™
electronic works
1.A. By reading or using any part of this Project Gutenberg™
electronic work, you indicate that you have read, understand, agree
to and accept all the terms of this license and intellectual property
(trademark/copyright) agreement. If you do not agree to abide by all
the terms of this agreement, you must cease using and return or
destroy all copies of Project Gutenberg™ electronic works in your
possession. If you paid a fee for obtaining a copy of or access to a
Project Gutenberg™ electronic work and you do not agree to be
bound by the terms of this agreement, you may obtain a refund from
the person or entity to whom you paid the fee as set forth in
paragraph 1.E.8.

1.B. “Project Gutenberg” is a registered trademark. It may only be


used on or associated in any way with an electronic work by people
who agree to be bound by the terms of this agreement. There are a
few things that you can do with most Project Gutenberg™ electronic
works even without complying with the full terms of this agreement.
See paragraph 1.C below. There are a lot of things you can do with
Project Gutenberg™ electronic works if you follow the terms of this
agreement and help preserve free future access to Project
Gutenberg™ electronic works. See paragraph 1.E below.
1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright law in
the United States and you are located in the United States, we do
not claim a right to prevent you from copying, distributing,
performing, displaying or creating derivative works based on the
work as long as all references to Project Gutenberg are removed. Of
course, we hope that you will support the Project Gutenberg™
mission of promoting free access to electronic works by freely
sharing Project Gutenberg™ works in compliance with the terms of
this agreement for keeping the Project Gutenberg™ name
associated with the work. You can easily comply with the terms of
this agreement by keeping this work in the same format with its
attached full Project Gutenberg™ License when you share it without
charge with others.

1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside the
United States, check the laws of your country in addition to the terms
of this agreement before downloading, copying, displaying,
performing, distributing or creating derivative works based on this
work or any other Project Gutenberg™ work. The Foundation makes
no representations concerning the copyright status of any work in
any country other than the United States.

1.E. Unless you have removed all references to Project Gutenberg:

1.E.1. The following sentence, with active links to, or other


immediate access to, the full Project Gutenberg™ License must
appear prominently whenever any copy of a Project Gutenberg™
work (any work on which the phrase “Project Gutenberg” appears, or
with which the phrase “Project Gutenberg” is associated) is
accessed, displayed, performed, viewed, copied or distributed:
This eBook is for the use of anyone anywhere in the United
States and most other parts of the world at no cost and with
almost no restrictions whatsoever. You may copy it, give it away
or re-use it under the terms of the Project Gutenberg License
included with this eBook or online at www.gutenberg.org. If you
are not located in the United States, you will have to check the
laws of the country where you are located before using this
eBook.

1.E.2. If an individual Project Gutenberg™ electronic work is derived


from texts not protected by U.S. copyright law (does not contain a
notice indicating that it is posted with permission of the copyright
holder), the work can be copied and distributed to anyone in the
United States without paying any fees or charges. If you are
redistributing or providing access to a work with the phrase “Project
Gutenberg” associated with or appearing on the work, you must
comply either with the requirements of paragraphs 1.E.1 through
1.E.7 or obtain permission for the use of the work and the Project
Gutenberg™ trademark as set forth in paragraphs 1.E.8 or 1.E.9.

1.E.3. If an individual Project Gutenberg™ electronic work is posted


with the permission of the copyright holder, your use and distribution
must comply with both paragraphs 1.E.1 through 1.E.7 and any
additional terms imposed by the copyright holder. Additional terms
will be linked to the Project Gutenberg™ License for all works posted
with the permission of the copyright holder found at the beginning of
this work.

1.E.4. Do not unlink or detach or remove the full Project


Gutenberg™ License terms from this work, or any files containing a
part of this work or any other work associated with Project
Gutenberg™.

1.E.5. Do not copy, display, perform, distribute or redistribute this


electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1 with
active links or immediate access to the full terms of the Project
Gutenberg™ License.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if you
provide access to or distribute copies of a Project Gutenberg™ work
in a format other than “Plain Vanilla ASCII” or other format used in
the official version posted on the official Project Gutenberg™ website
(www.gutenberg.org), you must, at no additional cost, fee or expense
to the user, provide a copy, a means of exporting a copy, or a means
of obtaining a copy upon request, of the work in its original “Plain
Vanilla ASCII” or other form. Any alternate format must include the
full Project Gutenberg™ License as specified in paragraph 1.E.1.

1.E.7. Do not charge a fee for access to, viewing, displaying,


performing, copying or distributing any Project Gutenberg™ works
unless you comply with paragraph 1.E.8 or 1.E.9.

1.E.8. You may charge a reasonable fee for copies of or providing


access to or distributing Project Gutenberg™ electronic works
provided that:

• You pay a royalty fee of 20% of the gross profits you derive from
the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”

• You provide a full refund of any money paid by a user who


notifies you in writing (or by e-mail) within 30 days of receipt that
s/he does not agree to the terms of the full Project Gutenberg™
License. You must require such a user to return or destroy all
copies of the works possessed in a physical medium and
discontinue all use of and all access to other copies of Project
Gutenberg™ works.

• You provide, in accordance with paragraph 1.F.3, a full refund of


any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.

• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.

1.E.9. If you wish to charge a fee or distribute a Project Gutenberg™


electronic work or group of works on different terms than are set
forth in this agreement, you must obtain permission in writing from
the Project Gutenberg Literary Archive Foundation, the manager of
the Project Gutenberg™ trademark. Contact the Foundation as set
forth in Section 3 below.

1.F.

1.F.1. Project Gutenberg volunteers and employees expend


considerable effort to identify, do copyright research on, transcribe
and proofread works not protected by U.S. copyright law in creating
the Project Gutenberg™ collection. Despite these efforts, Project
Gutenberg™ electronic works, and the medium on which they may
be stored, may contain “Defects,” such as, but not limited to,
incomplete, inaccurate or corrupt data, transcription errors, a
copyright or other intellectual property infringement, a defective or
damaged disk or other medium, a computer virus, or computer
codes that damage or cannot be read by your equipment.

1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except


for the “Right of Replacement or Refund” described in paragraph
1.F.3, the Project Gutenberg Literary Archive Foundation, the owner
of the Project Gutenberg™ trademark, and any other party
distributing a Project Gutenberg™ electronic work under this
agreement, disclaim all liability to you for damages, costs and
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade

Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.

Let us accompany you on the journey of exploring knowledge and


personal growth!

ebookname.com

You might also like